Monday June 24, 2019
Home Lead Story An Unidentifi...

An Unidentified Intention Of Crashing Apps On Latest Facebook 170.0

The users can now identify the version by tapping "more" in the updates tab of the App Store.

0
//
The users can now identify the version by tapping
Version 170.0 was the buggy release, and the company has already submitted a fix (170.1) to Apple, The Verge reported on Friday.

Facebook’s latest update for its Messenger app can fix the app that was crashing constantly among many iOS users, the media reported.

Version 170.0 was the buggy release, and the company has already submitted a fix (170.1) to Apple, The Verge reported on Friday.

facebook
Facebook was crashing constantly among many iOS users, Pixabay

According to The Verge, many people noticed that the app was crashing frequently after updating the previous update (170.0). The users found Messenger opens well initially. But when they switch to another app and come back to the messenger, it fades to black and crashes to the iPhone home screen.

Also Read: Facebook Admits “Bug” Exposed Private Posts Of 14 Million Users

According to a spokesperson, Facebook was aware of the issue and working on a new update.

Facebook has now confirmed that the new update should solve the issue, CNET reported. (IANS)

Next Story

Google Confirms Pre-installment of Trojan Triada on Android Smartphones

The report also said the supply chain attack was pulled off by one or more partners the manufacturers used in preparing the final firmware image used in the affected devices

0
Google
The Google logo is seen at a start-up campus in Paris, France, Feb. 15, 2018. VOA

Two years after a banking Trojan called Triada was spotted on some budget Android smartphones, Google has confirmed that criminals did actually manage to get an advanced backdoor pre-installed devices before they even left the manufacturing facilities.

Triada’s chief purpose was to install apps that could be used to send spam and display ads using tools that bypassed Android’s built-in security protections, thus allowing the malware to directly tamper with every installed app, Ars Technica reported on Saturday.

Triada first came to light in 2016 in articles published by Kaspersky that said the malware was “one of the most advanced mobile Trojans” the security firm’s analysts had ever encountered.

Google on an Android device. Pixabay

And while Google did confirm the Dr. Web report, it did not name the original equipment manufacturers.

The report also said the supply chain attack was pulled off by one or more partners the manufacturers used in preparing the final firmware image used in the affected devices.

Also Read- Experts Believe that Facebook Restrictions will Have Little Impact on Huawei

According to Lukasz Siewierski, a member of Google’s Android Security and Privacy Team, Triada infects device system images through a third party during the production process when the manufacturer turns to a third party developer to add a feature that does not come part of the Android Open Source Project, like face unlock. (IANS)